Deep learning-based intrusion detection systems: a systematic review

J Lansky, S Ali, M Mohammadi, MK Majeed… - IEEE …, 2021 - ieeexplore.ieee.org
Nowadays, the ever-increasing complication and severity of security attacks on computer
networks have inspired security researchers to incorporate different machine learning …

Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

Intrusion detection and big heterogeneous data: a survey

R Zuech, TM Khoshgoftaar, R Wald - Journal of Big Data, 2015 - Springer
Intrusion Detection has been heavily studied in both industry and academia, but
cybersecurity analysts still desire much more alert accuracy and overall threat analysis in …

Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

A unified architectural approach for cyberattack-resilient industrial control systems

C Zhou, B Hu, Y Shi, YC Tian, X Li… - Proceedings of the …, 2020 - ieeexplore.ieee.org
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …